Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
637c2449ae74dbb48549ab19fd7dc963_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
637c2449ae74dbb48549ab19fd7dc963_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
637c2449ae74dbb48549ab19fd7dc963_JaffaCakes118.html
-
Size
9KB
-
MD5
637c2449ae74dbb48549ab19fd7dc963
-
SHA1
ed9f05bfc90d5a7051dbedd4746a1c3d29f98d31
-
SHA256
1496e428ecd1be108b0b7ee27752ad12e4af13d2ecf1de2396c1e43dce6ef290
-
SHA512
04a5fa6a9e88089e3f859161178e39731f89c9e2ca604985ed503b32f5eef72f3edeb4be7af1d22ffd50364ce9d64cd85550e1b7d8d4ed892e02b97da8dffeb5
-
SSDEEP
96:uzVs+ux7lNLLY1k9o84d12ef7CSTUpzfzx57FBcM/Nd/QeuupJxv+yUGyY+eCxYp:csz7lNAYS/3kjYFTXb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000086861c721f875168c38f686f783e8de7eb6ac5c990b66974d9d1adfed4a824bc000000000e80000000020000200000003879a6b68532eb55258f3e7d772d75cd65591d043ddf80f28bd07131f57902a42000000030ec8bdce512d4d86a9c073abd78f38b86f688db5a1166f18345feecbb592f95400000004ab0dd055bf55a0fd2fc352b378177065249dd2be8815737043cdcf401d297d234b7ab16a38bce9d095af39213525612b2071c2761e2acc6615d06fde83f3f03 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427820144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03ce5f342dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EC80EA1-4836-11EF-A817-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2336 2412 iexplore.exe 29 PID 2412 wrote to memory of 2336 2412 iexplore.exe 29 PID 2412 wrote to memory of 2336 2412 iexplore.exe 29 PID 2412 wrote to memory of 2336 2412 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\637c2449ae74dbb48549ab19fd7dc963_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd214810bdfd390e8be923ddd5f6ce72
SHA1a37676890734e4c83a5c104b5a82154f6d5d0434
SHA256c347e2ec306cc5ab448605bc705ca7066becb1562a8545d8da5de5474c26d8ac
SHA51251537e6c8ed79faff54bba26a6ad11bdbca25fd2bcebd3bd59114c4ec5e0e98bfee04b64a21688f103061a518be527d4653953ac86823fa174da9fa02fc8ea37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c60b3824ee9137f08fbac78b17216a
SHA13eafb1a649d719bc2104f4fdf1e83145a6a70ce2
SHA2562c7633054cd66f9d3de7d9b640724109f8ee13a60c3aba1bc9ff9441943e1c57
SHA5122d6e0ae0c31aa2cf758d0125a21f188322eb26082aaf3912dbfe7c1cc26e61bbeacd58cdaa5c2fe05d6dc39e4356b15fc3e84799333d79fdc2424d0317ae18bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc61bd466ae98fe96784c8653443b93
SHA12653aef812ab7654f9b5e8e1305e48644a32f66b
SHA2562a2b88512dd89d5241dea3b6366eaf02e56b6a192aad92f1f4676d7c7a0fc3ae
SHA512a9d43d6b9d550d46da250ba0dbd02d17855e70c4be1b6f3d92b53158243f9e9c2965074d2bb3470718fdc81b2716f1fa3878fc5940e9136e60f6c689f2f60bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730e25b8d9a192e4b5e622f604a10cc5
SHA1683b647facc2b44dc99fb27f5f906e6a63f55742
SHA25615130729ee7342383b3b281e31314dedf5a66a70463e12586fc2a302a165a3b4
SHA512e152cc341fba73426d196d754b844b1c80c035a6cb125a4f4d0003d505c739b6215cc79ea56c4c43c47f23f5efc5de69d24719d4ecdf9bdc14d378344ee3dcc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f1a94107e9b4b003b264b9599b5687
SHA12555302140cd1b4940e61897ff4caf81acbcc08b
SHA256b2c2d341e860ad3126627fa43991eb1a17b40617882ee61d7f00d9ef832261e2
SHA5125e6439d3e20f3d6fbf54e0fee6e0dd087494626ae1cd4de99faebed72842afe6ee88be7ba80eae7995a01392e02d8e63dca71c7a5593fac2351c6baab5c15e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f867ba21630c25eff6aec921129a38f2
SHA1a85ad7a3dfcbc1341c333030a04398fcbe7749a2
SHA25695b21a3a94011f63ad1af4d179a10c566ebffe2fb94d6f0af628bb3a774553c8
SHA512ae1f97822988fe0068c545922b5671264b75e6b745ea5e2cbfea6b0dcc7ab813efe6e3994b0613e4ad01cc22841e00e4e266f578c348bbe95eee93bba81a428c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50992e74614e9b1c74177cc70bcc6276a
SHA1e2f77f1511bc6a0014742e7bfca43a514cfc1ff6
SHA256c078ac56837698273dfcda7d68e3781f26abbf8d1d45caefe0e22cd540c559e5
SHA512cb93952895c968e7d170bd73c181736615c61f8d3db5434b4c787c072dab626027e56648d60b99870080a71a1eb9d19b3cddf9d6c060883aa2a178f4171891ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584653c05fdb7f9575c07903ae58b2b7b
SHA1e518e0629b389295df455216d21c249dae55ceb7
SHA256e3565efe703c48a5c992bada7571c894196b9c5646f7a7ace396e83ff828ca4a
SHA51209ff4d87a018ff724ada343d44b2c1e6dff835856399431d39b97805e16b951d54c299a92a9f66110084ac382c65f1697b47fca86aaf2860395059b438b13536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5376f58cd49255e7d792dbdd874188
SHA1dff1b54e38b665e424f7691530762776c6c3e8ff
SHA2562f4844e0a416fe2337939f256c645eb0c959df2df5d2fa0337943da5b15bea77
SHA5123d0e6c0ddf73505b09d89f0c646ea497cb986b3c417313a3653ea283dddac323f1fc331f49550c7edd5581699bc7529e4ee0a29c8ba156c569cedc3e223bc8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58ed20f34338e5509cdce14f68652f1
SHA187e7d4ddbf6ea400b111f449d468e7bfdc613243
SHA25671c767fa0a865ce34ceac3c79649cd35846ec4b47489e67910d72a0b48ed9d4b
SHA512f338ce6f03314ef64a807d061e7e63eccdcb21fc9a8ef4c06148b10ead8b62c7ee50b406252ec1b319521f5a85b1c1e9b7a9db7af8f2a47d54360a9684e74253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755f7a8cfdaf602138a4e1aa98d6aa79
SHA1b08bca81302a03f79a0acda03b13d13a76849114
SHA25624d889dd277758ecacc15a33837f41414aab5c12754b9eb9c5fe37618c9fa7d6
SHA5126c15a76e5d7ad82a77691955d3fec637bfda30268c0bef1b8e36e19309bac6b8be4473ac847f9cf07e3e0148969f5a3cc97adf9fd7f1cdd98185ad12b2cbbd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448cc33bd63c16d96fcac057b560aac6
SHA1cd7b2f3c402fb7d5b7eade14ba50726e77ce03b5
SHA256b20e929565db6bac55f18f3ad4d7557cbe119ea59d1c1762e1f67a2e7d674971
SHA512d121ccd870c5783ca4bfe88009267d6c4bc55eb29931efc04e1f1c2c0563109fe34c2edefbd3c9b8bb2f4dc7b9ff8d32c3cdaa8aa7cfbf9a957554babeabdef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999626e0200024a8e2d435656f246809
SHA1eadea1ca57ad90c2364b7fa4964230df67f5b29d
SHA256e11ba0e4e401301bc9f10f4710cbcf8b3930715d3d570a7ec8a8ebb61f716a0e
SHA512016563cb55360dd3d23559135caf9b9f6529fc16bec67f221c44838fbfa3b9a65e94a479ad95c1dc021701bb6f88c3b7442eb51d1e31e6dce5b7e77928771ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3e4bca87c57dc7bc992855a9104479
SHA161948f43ef9a27518e168d9103bcc3b2156d0dfa
SHA2560322bbee3aa9f2ba91f3923f2259d8a5bf87172e23996f91abb6c1db883659f5
SHA51264829a3f2f68f64a061013baaffb5ce6bf64cce09c726966f84912929f98b57f3c7a6d381d7dd254415b12b290128845c3b6c99cf8414cc491cc4e425a8f5832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4ee675039d6eb601033c9082b7d868
SHA1d9c7f3f46198d1d3d405d4d2923ba1b92d1036dd
SHA2561579b8264b904b99021278b9f6d3e33185c82b884455201f1506e9035d137830
SHA512879e4198ad604f15b9b3c7c32fe7f773c9bcd90811bab09a08759b57492e94f76165012463e15eab44948f1ea9b9acd5f1d3ea6eee1550478b7d410021979ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f459898c7a7c0132f5aa734d04a1c577
SHA1d91cb1888513fe705fa8a2efec7097cb03303e6e
SHA2563a8887d71eb661f552f765551784e5e9bd038bad884b9b7a41ae29fa68704832
SHA512e7e14df16c7c9240ac3a7b2e786fabdbead80f833669eb636307c6b0d998fbc3a439beb4ae305a5609167fcedf473026b380d54fb94cfea44d11b50ea33dc569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4f134e453bd507e54e229ca1aaea41
SHA1e4491fa9c0ad926776474b93568e42257db9adbd
SHA2567e9c81412a816b8cb9efc4911b166ac2d050aca52474bd4d71a9ded7027b0b82
SHA512ed2b93837bfd029c3b0bbba2c00c4534b27ab6b9ca8cbb9cbb695fce296397bef0af6125a35c0e95d2f9cf3f01ae53646fd7c3e4ae8cf9c43140f93c47a6ec1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6b5bfc0f51d0ab05f836c632e38825
SHA1e918ca1953b300fba8016136253b8951b1f8c836
SHA256194666cdb17d0d6ba52c8d2d4037f67d289be9d51bef63e58212f3708e1bbb01
SHA51212c7d4628ddc0edee28a77c82b51544c2a581df63f5916a177937b6e2142c0fa1ebd1fb34ab4e8acccc7b7765d95e91f514f791dc27c3e9a4ddd338be5912b89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b